CN117057809A - User behavior analysis method, system, electronic equipment and medium - Google Patents

User behavior analysis method, system, electronic equipment and medium Download PDF

Info

Publication number
CN117057809A
CN117057809A CN202311316608.0A CN202311316608A CN117057809A CN 117057809 A CN117057809 A CN 117057809A CN 202311316608 A CN202311316608 A CN 202311316608A CN 117057809 A CN117057809 A CN 117057809A
Authority
CN
China
Prior art keywords
user
information
bearing capacity
risk
obtaining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311316608.0A
Other languages
Chinese (zh)
Inventor
汪勇军
杨铭
李藩钛
高鹏
余灵巧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Qiankunyun Intelligent Technology Co ltd
Original Assignee
Sichuan Qiankunyun Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Qiankunyun Intelligent Technology Co ltd filed Critical Sichuan Qiankunyun Intelligent Technology Co ltd
Priority to CN202311316608.0A priority Critical patent/CN117057809A/en
Publication of CN117057809A publication Critical patent/CN117057809A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis

Abstract

The application belongs to the technical field of computers, and aims to provide a user behavior analysis method, a system, electronic equipment and a medium. In the implementation process, the risk bearing capacity value of the current appointed user and the user group of the current appointed user are obtained by acquiring the user information of the appointed user, obtaining the user deep information according to the user information, and then obtaining the risk bearing capacity value of the current appointed user according to the user deep information; then, sorting the risk bearing capacity values and the risk bearing capacity values of all users in the user group to obtain a sorting result, and obtaining the risk bearing capacity grade of the current appointed user according to the sorting result; and finally, obtaining and outputting a user asset configuration early warning result according to the risk bearing capacity grade and the asset configuration information of the current appointed user. In the process, the application realizes the risk assessment of investors, is beneficial to security companies to comprehensively master the risks of investors, and has popularization and application values.

Description

User behavior analysis method, system, electronic equipment and medium
Technical Field
The application belongs to the technical field of computers, and particularly relates to a user behavior analysis method, a system, electronic equipment and a medium.
Background
The securities industry is one of the important components in the financial service field, and mainly provides the issuing, trading and investment services of securities products such as stocks, bonds, funds and the like. In the securities industry, in order to know the risk bearing capacity and potential risk of an investor, securities companies generally acquire investment experiences, trade styles, risk preferences and the like of users in the form of questionnaires so as to provide more accurate investment services for the investor, thereby improving the satisfaction of the investor in using the securities investment services. However, in using the prior art, the inventors found that there are at least the following problems in the prior art: the actual situation of investors often has a large gap from the expectations expressed in questionnaires, so that the security company has insufficient control over the risks of the investors, and the security company has insufficient early warning and coping capacities on the risks of the investors.
Disclosure of Invention
The application aims to solve the technical problems at least to a certain extent, and provides a user behavior analysis method, a system, electronic equipment and a medium.
In order to achieve the above purpose, the present application adopts the following technical scheme:
in a first aspect, the present application provides a method for analyzing user behavior, including:
acquiring user information of a designated user;
obtaining deep user information according to the user information;
obtaining a risk bearing capacity value of a current appointed user and a user group to which the current appointed user belongs according to the deep user information;
the risk bearing capacity values and the risk bearing capacity values of all users in the user group are ranked, and a ranking result is obtained;
according to the sorting result, obtaining the risk bearing capacity grade of the current appointed user;
and obtaining and outputting a user asset configuration early warning result according to the risk bearing capacity grade and the asset configuration information of the current appointed user.
The embodiment can evaluate the risk of the investor, and is beneficial to realizing the risk early warning of the investor. Specifically, in the implementation process of the embodiment, the user information of the appointed user is obtained, the user deep information is obtained according to the user information, and then the risk bearing capacity value of the current appointed user and the user group to which the current appointed user belongs are obtained according to the user deep information; then, sorting the risk bearing capacity values and the risk bearing capacity values of all users in the user group to obtain a sorting result, and obtaining the risk bearing capacity grade of the current appointed user according to the sorting result; and finally, obtaining and outputting a user asset configuration early warning result according to the risk bearing capacity grade and the asset configuration information of the current appointed user. In the process, the risk assessment of investors is realized, the security company can comprehensively master the risk of the investors, and the method and the device have popularization and application values.
In one possible design, the user information includes user basic information and user behavior information; the user basic information is extracted from the user registration information; user behavior information is extracted from the target website by using a Google analysis tool.
In one possible design, after obtaining the user information of the specified user, the method further includes:
preprocessing the user information to obtain preprocessed user information;
and carrying out noise elimination processing on the preprocessed user information to obtain denoised user information so as to obtain user deep information according to the denoised user information.
In one possible design, the user deep information includes user category deep information corresponding to user basic information; correspondingly, obtaining deep user information according to the user information comprises the following steps:
classifying the basic information of the user to obtain user class characteristics;
performing hot independent coding on the user category characteristics, and converting the user category characteristics into user category characteristic vectors;
and performing a first convolution operation on the user category feature vector to obtain user category depth information.
In one possible design, the user deep information further includes user behavior deep information corresponding to the user behavior information; correspondingly, obtaining the deep information of the user according to the user information, and further comprises:
classifying the user behavior information to obtain user behavior characteristics;
performing hot independent coding on the user behavior characteristics, and converting the user behavior characteristics into user behavior characteristic vectors;
and performing a second convolution operation on the user behavior feature vector to obtain user behavior depth information.
In one possible design, obtaining the risk bearing capability value of the current appointed user and the user group to which the current appointed user belongs according to the deep information of the user comprises:
obtaining a risk bearing capacity value of a current appointed user according to the deep information of the user;
according to the risk bearing capacity value, extracting all matched users with the difference value between the sampling risk bearing capacity value and the risk bearing capacity value smaller than a preset value from a pre-stored sampling user group;
and combining all the matched users to obtain the user group of the current appointed user.
In one possible design, after obtaining the risk tolerance level of the currently specified user, the method further includes:
and updating the asset configuration information of the current appointed user according to the risk bearing capacity level to obtain and output updated asset configuration information.
In a second aspect, the present application provides a user behavior analysis system for implementing a user behavior analysis method according to any one of the above; the user behavior analysis system includes:
the user information acquisition module is used for acquiring user information of a designated user;
the user deep information generation module is in communication connection with the user information acquisition module and is used for acquiring user deep information according to the user information;
the risk assessment module is in communication connection with the user deep information generation module and is used for obtaining a risk bearing capacity value of the current appointed user and a user group to which the current appointed user belongs according to the user deep information; the risk bearing capacity value is used for sorting the risk bearing capacity values and the risk bearing capacity values of all users in the user group to obtain a sorting result; the risk bearing capacity grade of the current appointed user is obtained according to the sequencing result;
and the risk early warning module is in communication connection with the risk assessment module and is used for obtaining and outputting a user asset configuration early warning result according to the risk bearing capacity grade and the asset configuration information of the current appointed user.
In a third aspect, the present application provides an electronic device, comprising:
a memory for storing computer program instructions; the method comprises the steps of,
a processor for executing computer program instructions to perform the operations of the user behavior analysis method of any one of the above.
In a fourth aspect, the present application provides a computer readable storage medium storing computer program instructions readable by a computer, the computer program instructions being configured to perform operations of a user behavior analysis method as any one of the above, when run.
Drawings
FIG. 1 is a flow chart of a user behavior analysis method in an embodiment;
FIG. 2 is a block diagram of a user behavior analysis system in an embodiment;
fig. 3 is a block diagram of an electronic device in an embodiment.
Detailed Description
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the present application will be briefly described below with reference to the accompanying drawings and the description of the embodiments or the prior art, and it is obvious that the following description of the structure of the drawings is only some embodiments of the present application, and other drawings can be obtained according to these drawings without inventive effort to a person skilled in the art. It should be noted that the description of these examples is for aiding in understanding the present application, but is not intended to limit the present application.
Example 1:
the present embodiment discloses a user behavior analysis method, which may be performed by, but not limited to, a computer device or a virtual machine with a certain computing resource, for example, an electronic device such as a personal computer, a smart phone, a personal digital assistant, or a wearable device, or a virtual machine.
As shown in fig. 1, a method for analyzing user behavior may include, but is not limited to, the following steps:
s1, acquiring user information of a designated user; the user information comprises user basic information and user behavior information; in this embodiment, the user basic information includes personal basic condition information such as account identification information extracted from user registration information, user gender and user age, bin holding information extracted from user account transaction information, user personal credit information extracted from a third party credit platform, and the user behavior information includes browsing content, browsing times, browsing operation number, browsing time, and the like, which are not limited herein. In addition, in this embodiment, the user information of the designated user may be obtained once a week, once a month, etc., which is not limited herein, so as to realize dynamic assessment and risk early warning of the risk bearing capability of the user.
In this embodiment, the user basic information is extracted from the user registration information; user behavior information may be extracted from a target website using, but is not limited to, google Analysis (GA) tools, a data analysis tool based on user behavior developed by Google corporation. Specifically, the data analysis dimension of the GA tool is more detailed, the application process is more flexible, user operation data, target conversion data and the like of the target website can be conveniently and intuitively known, in this embodiment, the GA tool can collect user information based on Ajax, when collecting the user information, through inserting a JavaScript statistical code at one end on a page of the target website, when the user accesses the target website, the statistical code is executed, and at this time, user behavior information of the user on the target website can be obtained.
The quantity of user behavior information such as securities trade data quantity is huge, and meanwhile, a large amount of noise and errors exist in the information, so that the availability of the data is low, and the accuracy of user behavior analysis is low; meanwhile, because the data volume of the user behavior information is huge, the data processing efficiency is lower when user behavior analysis is performed based on the data volume. In order to solve the above-mentioned existing problems, in this embodiment, after obtaining the user information of the designated user, the method further includes:
A1. preprocessing the user information to obtain preprocessed user information; when the user information is preprocessed, the preprocessing such as cleaning, deduplication, missing value filling, outlier processing and the like may be performed on the user information, so as to ensure the data quality and accuracy when the user behavior analysis is performed.
A2. And carrying out noise elimination processing on the preprocessed user information to obtain denoised user information so as to obtain user deep information according to the denoised user information.
In this embodiment, after user information of a designated user is obtained, the user information after noise removal is obtained by performing preprocessing, noise elimination and other processes on the user information, and then subsequent data processing is performed according to the user information after noise removal, so that user behavior analysis is performed, the overall quality of data is improved, the accuracy of user analysis and identification and the data processing efficiency can be improved, further, security companies can be facilitated to better cope with user risks, and meanwhile, security companies can be facilitated to better formulate differentiated marketing strategies for users, so that accurate marketing is realized.
S2, obtaining deep user information according to the user information; the user deep information comprises user category depth information corresponding to the user basic information and user behavior depth information corresponding to the user behavior information.
Correspondingly, obtaining deep user information according to the user information comprises the following steps:
classifying the basic information of the user to obtain user class characteristics;
performing Hot independent coding (namely One-Hot coding, also called One-bit effective coding) on the user category characteristics, and converting the user category characteristics into user category characteristic vectors;
and performing a first convolution operation on the user category feature vector to obtain user category depth information.
Obtaining deep user information according to the user information, and further comprising:
classifying the user behavior information to obtain user behavior characteristics;
performing hot independent coding on the user behavior characteristics, and converting the user behavior characteristics into user behavior characteristic vectors;
and performing a second convolution operation on the user behavior feature vector to obtain user behavior depth information.
In this embodiment, the user information is processed by using the hot independent code, which is beneficial to improving the processing efficiency of the user information and facilitating the subsequent operations such as classifying the user based on the user information.
In addition, in this embodiment, a preset convolution network is used to perform convolution operation on the user category feature vector and the user behavior feature vector, so that implicit information of the user category feature vector and the user behavior feature vector, that is, user category depth information and user behavior depth information, can be extracted, and further accuracy of subsequent data analysis and processing can be improved conveniently.
In this embodiment, the data mining processing of the user information is implemented through convolution operation, so that as much hidden information as possible can be extracted from the user information containing a large amount of redundant information, which is convenient for fast processing of the massive user information, and further provides a data basis for subsequent user behavior analysis. It should be understood that, in this embodiment, when deep information of a user is obtained, the deep information of the user may also be obtained through a clustering algorithm, and specifically, behaviors of different users may be clustered according to similarity, so as to implement classification processing on the behaviors of the user, and further facilitate prediction on the behaviors of the user.
S3, obtaining a risk bearing capacity value of the current appointed user and a user group to which the current appointed user belongs according to the deep information of the user.
According to the deep information of the user, obtaining the risk bearing capacity value of the current appointed user and the user group to which the current appointed user belongs, wherein the method comprises the following steps:
s301, obtaining a risk bearing capacity value of a current appointed user according to deep information of the user;
s302, according to the risk bearing capacity value, extracting all matched users with the difference value between the sampling risk bearing capacity value and the risk bearing capacity value smaller than a preset value from a pre-stored sampling user group; it should be noted that, the difference between the risk bearing capacity value of the matching user and the risk bearing capacity value of the current appointed user is smaller than the preset value, that is, the risk bearing capacity level of the matching user is the same as the risk bearing capacity level of the current appointed user, and the risk bearing capacity values of the current appointed user in all the matching users can be ordered according to the asset configuration conditions of all the matching users, so that basis is provided for asset configuration early warning and the like of the current appointed user.
S303, combining all the matched users to obtain the user group of the current appointed user.
S4, sorting the risk bearing capacity values and the risk bearing capacity values of all users in the user group to obtain a sorting result.
S5, obtaining the risk bearing capacity grade of the current appointed user according to the sequencing result; it should be noted that the risk tolerance level is not limited herein, such as aggressive (e.g., the ranking result is at the first 30% of the risk tolerance values of the users in the user group), smooth (e.g., the ranking result is at 30% -70% of the risk tolerance values of the users in the user group), conservative (e.g., the ranking result is at the last 30% of the risk tolerance values of the users in the user group), and so on.
S6, obtaining and outputting a user asset configuration early warning result according to the risk bearing capacity grade and the asset configuration information of the current appointed user. In this embodiment, the user asset configuration early warning result includes an early warning level, if the risk level of the configuration scheme corresponding to the asset configuration information of the current designated user is higher than the risk bearing capacity level, the early warning level is higher so as to prompt the user to change the asset configuration scheme as soon as possible, avoid the user to bear investment risk greater than the risk bearing capacity of the user, and if the risk level of the configuration scheme corresponding to the asset configuration information of the current designated user is lower than the risk bearing capacity level, the early warning level is lower so as to prompt the user to properly adjust the asset configuration scheme of the current designated user.
In this embodiment, after obtaining the risk tolerance capability level of the current designated user, the method further includes:
s7, updating the asset configuration information of the current appointed user according to the risk bearing capacity level to obtain and output updated asset configuration information.
The embodiment can evaluate the risk of the investor, and is beneficial to realizing the risk early warning of the investor. Specifically, in the implementation process of the embodiment, the user information of the appointed user is obtained, the user deep information is obtained according to the user information, and then the risk bearing capacity value of the current appointed user and the user group to which the current appointed user belongs are obtained according to the user deep information; then, sorting the risk bearing capacity values and the risk bearing capacity values of all users in the user group to obtain a sorting result, and obtaining the risk bearing capacity grade of the current appointed user according to the sorting result; and finally, obtaining and outputting a user asset configuration early warning result according to the risk bearing capacity grade and the asset configuration information of the current appointed user. In the process, the embodiment realizes the risk assessment of the investor, is beneficial to the securities corporation to comprehensively master the risk of the investor, can be beneficial to finding out the problems and pain points encountered by the investor in the securities trading process, provides better user experience, is convenient for better knowing the investment demand and the investment preference of the investor, more accurately performs market positioning and user portrayal, is convenient for the securities corporation to provide more accurate investment service for the investor, thereby saving marketing cost, improving market competitiveness, better monitoring the trading behavior of the investor, predicting user risk and performing user risk management, and has popularization and application values.
Example 2:
the embodiment discloses a user behavior analysis system, which is used for realizing the user behavior analysis method in the embodiment 1; as shown in fig. 2, the user behavior analysis system includes:
the user information acquisition module is used for acquiring user information of a designated user;
the user deep information generation module is in communication connection with the user information acquisition module and is used for acquiring user deep information according to the user information;
the risk assessment module is in communication connection with the user deep information generation module and is used for obtaining a risk bearing capacity value of the current appointed user and a user group to which the current appointed user belongs according to the user deep information; the risk bearing capacity value is used for sorting the risk bearing capacity values and the risk bearing capacity values of all users in the user group to obtain a sorting result; the risk bearing capacity grade of the current appointed user is obtained according to the sequencing result;
and the risk early warning module is in communication connection with the risk assessment module and is used for obtaining and outputting a user asset configuration early warning result according to the risk bearing capacity grade and the asset configuration information of the current appointed user.
Example 3:
on the basis of embodiment 1 or 2, this embodiment discloses an electronic device, which may be a smart phone, a tablet computer, a notebook computer, a desktop computer, or the like. An electronic device may be referred to as being used for a terminal, a portable terminal, a desktop terminal, etc., as shown in fig. 3, the electronic device includes:
a memory for storing computer program instructions; the method comprises the steps of,
a processor for executing computer program instructions to perform the operations of the user behavior analysis method as in any one of embodiment 1.
In particular, processor 301 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 301 may be implemented in at least one hardware form of DSP (Digital Signal Processing ), FPGA (Field-Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array ). The processor 301 may also include a main processor, which is a processor for processing data in an awake state, also called a CPU (Central Processing Unit ), and a coprocessor; a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 301 may integrate a GPU (Graphics Processing Unit, image processor) for rendering and drawing of content required to be displayed by the display screen.
Memory 302 may include one or more computer-readable storage media, which may be non-transitory. Memory 302 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 302 is used to store at least one instruction for execution by processor 301 to implement the user behavior analysis method provided in embodiment 1 of the present application.
In some embodiments, the terminal may further optionally include: a communication interface 303, and at least one peripheral device. The processor 301, the memory 302 and the communication interface 303 may be connected by a bus or signal lines. The respective peripheral devices may be connected to the communication interface 303 through a bus, signal line, or circuit board. Specifically, the peripheral device includes: at least one of radio frequency circuitry 304, a display screen 305, and a power supply 306.
The communication interface 303 may be used to connect at least one peripheral device associated with an I/O (Input/Output) to the processor 301 and the memory 302. In some embodiments, processor 301, memory 302, and communication interface 303 are integrated on the same chip or circuit board; in some other embodiments, either or both of the processor 301, the memory 302, and the communication interface 303 may be implemented on separate chips or circuit boards, which is not limited in this embodiment.
The Radio Frequency circuit 304 is configured to receive and transmit RF (Radio Frequency) signals, also known as electromagnetic signals. The radio frequency circuitry 304 communicates with a communication network and other communication devices via electromagnetic signals.
The display screen 305 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof.
The power supply 306 is used to power the various components in the electronic device.
Example 4:
on the basis of any one of embodiments 1 to 3, this embodiment discloses a computer-readable storage medium for storing computer-readable computer program instructions configured to perform operations of the user behavior analysis method of embodiment 1 when run.
It will be apparent to those skilled in the art that the modules or steps of the application described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, or they may alternatively be implemented in program code executable by computing devices, such that they may be stored in a memory device for execution by the computing devices, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps within them may be fabricated into a single integrated circuit module. Thus, the present application is not limited to any specific combination of hardware and software.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solution of the present application, and not limiting thereof; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some of the technical features thereof can be replaced by equivalents. Such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A method for analyzing user behavior, characterized in that: comprising the following steps:
acquiring user information of a designated user;
obtaining user deep information according to the user information;
obtaining a risk bearing capacity value of a current appointed user and a user group to which the current appointed user belongs according to the user deep information;
the risk bearing capacity value and the risk bearing capacity values of all users in the affiliated user group are ranked to obtain a ranking result;
according to the sorting result, obtaining the risk bearing capacity grade of the current appointed user;
and obtaining and outputting a user asset configuration early warning result according to the risk bearing capacity grade and the asset configuration information of the current appointed user.
2. A method of user behavior analysis according to claim 1, wherein: the user information comprises user basic information and user behavior information; wherein, the user basic information is extracted from the user registration information; the user behavior information is extracted from the target website by using a Google analysis tool.
3. A method of user behavior analysis according to claim 1, wherein: after obtaining the user information of the designated user, the method further comprises:
preprocessing the user information to obtain preprocessed user information;
and carrying out noise elimination processing on the preprocessed user information to obtain denoised user information so as to obtain user deep information according to the denoised user information.
4. A method of user behavior analysis according to claim 2, wherein: the user deep information comprises user category depth information corresponding to the user basic information; correspondingly, obtaining the deep user information according to the user information comprises the following steps:
classifying the user basic information to obtain user class characteristics;
performing hot independent coding on the user category characteristics, and converting the user category characteristics into user category characteristic vectors;
and performing a first convolution operation on the user category feature vector to obtain user category depth information.
5. A method of user behavior analysis according to claim 4, wherein: the user deep information also comprises user behavior depth information corresponding to the user behavior information; correspondingly, obtaining the deep user information according to the user information, and further comprises:
classifying the user behavior information to obtain user behavior characteristics;
performing hot independent coding on the user behavior characteristics, and converting the user behavior characteristics into user behavior characteristic vectors;
and performing a second convolution operation on the user behavior feature vector to obtain user behavior depth information.
6. A method of user behavior analysis according to claim 1, wherein: obtaining a risk bearing capacity value of the current appointed user and a user group to which the current appointed user belongs according to the user deep information, wherein the method comprises the following steps:
obtaining a risk bearing capacity value of a current appointed user according to the user deep information;
according to the risk bearing capacity value, extracting all matched users with the difference value between the sampling risk bearing capacity value and the risk bearing capacity value smaller than a preset value from a pre-stored sampling user group;
and combining all the matched users to obtain the user group of the current appointed user.
7. A method of user behavior analysis according to claim 1, wherein: after obtaining the risk bearing capacity level of the current appointed user, the method further comprises the following steps:
and updating the asset configuration information of the current appointed user according to the risk bearing capacity level to obtain and output updated asset configuration information.
8. A user behavior analysis system, characterized by: for implementing the user behavior analysis method according to any one of claims 1 to 7; the user behavior analysis system includes:
the user information acquisition module is used for acquiring user information of a designated user;
the user deep information generation module is in communication connection with the user information acquisition module and is used for acquiring user deep information according to the user information;
the risk assessment module is in communication connection with the user deep information generation module and is used for obtaining a risk bearing capacity value of a current appointed user and a user group to which the current appointed user belongs according to the user deep information; the risk bearing capacity value is used for sorting the risk bearing capacity values and the risk bearing capacity values of all users in the affiliated user group to obtain a sorting result; the risk bearing capacity grade of the current appointed user is obtained according to the sorting result;
and the risk early warning module is in communication connection with the risk assessment module and is used for obtaining and outputting a user asset configuration early warning result according to the risk bearing capacity grade and the asset configuration information of the current appointed user.
9. An electronic device, characterized in that: comprising the following steps:
a memory for storing computer program instructions; the method comprises the steps of,
a processor for executing the computer program instructions to perform the operations of the user behavior analysis method of any one of claims 1 to 7.
10. A computer readable storage medium storing computer program instructions readable by a computer, characterized by: the computer program instructions are configured to perform the operations of the user behavior analysis method of any one of claims 1 to 7 when run.
CN202311316608.0A 2023-10-12 2023-10-12 User behavior analysis method, system, electronic equipment and medium Pending CN117057809A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311316608.0A CN117057809A (en) 2023-10-12 2023-10-12 User behavior analysis method, system, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311316608.0A CN117057809A (en) 2023-10-12 2023-10-12 User behavior analysis method, system, electronic equipment and medium

Publications (1)

Publication Number Publication Date
CN117057809A true CN117057809A (en) 2023-11-14

Family

ID=88664900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311316608.0A Pending CN117057809A (en) 2023-10-12 2023-10-12 User behavior analysis method, system, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN117057809A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109636084A (en) * 2018-10-22 2019-04-16 中国平安人寿保险股份有限公司 Consumer's risk type evaluation method, storage medium and equipment based on big data
CN115358878A (en) * 2022-08-29 2022-11-18 中国银行股份有限公司 Financing user risk preference level analysis method and device
CN115408621A (en) * 2022-08-12 2022-11-29 中国测绘科学研究院 Interest point recommendation method considering linear and nonlinear interaction of auxiliary information features

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109636084A (en) * 2018-10-22 2019-04-16 中国平安人寿保险股份有限公司 Consumer's risk type evaluation method, storage medium and equipment based on big data
CN115408621A (en) * 2022-08-12 2022-11-29 中国测绘科学研究院 Interest point recommendation method considering linear and nonlinear interaction of auxiliary information features
CN115358878A (en) * 2022-08-29 2022-11-18 中国银行股份有限公司 Financing user risk preference level analysis method and device

Similar Documents

Publication Publication Date Title
CN109035013A (en) Detect the device and method and computer readable storage medium of abnormal financial transaction
CN111783039B (en) Risk determination method, risk determination device, computer system and storage medium
CN108073429B (en) Payment mode configuration method, device, equipment and storage medium
CN111950279A (en) Entity relationship processing method, device, equipment and computer readable storage medium
CN110942392A (en) Service data processing method, device, equipment and medium
CN111582314A (en) Target user determination method and device and electronic equipment
CN113034046A (en) Data risk metering method and device, electronic equipment and storage medium
CN113377958A (en) Document classification method and device, electronic equipment and storage medium
EP3869398A2 (en) Method and apparatus for processing image, device and storage medium
CN113378855A (en) Method for processing multitask, related device and computer program product
CN116935368A (en) Deep learning model training method, text line detection method, device and equipment
CN113762109B (en) Training method of character positioning model and character positioning method
CN117057809A (en) User behavior analysis method, system, electronic equipment and medium
CN115934928A (en) Information extraction method, device, equipment and storage medium
CN113674091A (en) Information filling method and device, storage medium and electronic equipment
CN112434083A (en) Event processing method and device based on big data
CN111429257A (en) Transaction monitoring method and device
CN116339733B (en) Application page generation method, system, electronic device and medium
CN115221391A (en) Object screening method, device and equipment
CN117557058A (en) Hospital intelligent purchasing method, device, equipment and storage medium based on digital management
CN117312673A (en) Enterprise customer recommendation method, system, electronic equipment and medium
CN114565402A (en) Information recommendation method and device and electronic equipment
CN117786087A (en) Information extraction method, device, equipment and storage medium
CN116562974A (en) Object recognition method, device, electronic equipment and storage medium
CN116303688A (en) Digital analysis method, system, equipment and medium based on Internet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination